CN115065680B - Secret ledger access method, system and storable medium based on blockchain - Google Patents

Secret ledger access method, system and storable medium based on blockchain Download PDF

Info

Publication number
CN115065680B
CN115065680B CN202210644234.4A CN202210644234A CN115065680B CN 115065680 B CN115065680 B CN 115065680B CN 202210644234 A CN202210644234 A CN 202210644234A CN 115065680 B CN115065680 B CN 115065680B
Authority
CN
China
Prior art keywords
secret
ledger
access
blockchain
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210644234.4A
Other languages
Chinese (zh)
Other versions
CN115065680A (en
Inventor
凌帅
贾宁
马寿峰
李庚�
张艺敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN202210644234.4A priority Critical patent/CN115065680B/en
Publication of CN115065680A publication Critical patent/CN115065680A/en
Application granted granted Critical
Publication of CN115065680B publication Critical patent/CN115065680B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a secret ledger access method, a secret ledger access system and a storable medium based on a blockchain, and relates to the technical field of secret management, wherein the method comprises the following steps: the user sends out request information for accessing the secret ledger through the browser; performing identity verification on the user terminal, and selecting a data node in the blockchain network to access if the user terminal passes the identity verification; positioning confidential account information at the data node to realize access; the invention effectively reduces the tamper-evident property of the secret account.

Description

Secret ledger access method, system and storable medium based on blockchain
Technical Field
The invention relates to the technical field of security management, in particular to a blockchain-based security ledger access method, a blockchain-based security ledger access system and a storable medium.
Background
Currently, blockchain technology has substantial ground application and deep theoretical research foundation in many fields, wherein in the government work field, blockchain promotes the development of government information sharing and online authentication of a large amount of important information by virtue of the characteristics of decentralization, non-tampering and the like. Privacy efforts are part of government work and no attempt has been made to incorporate blockchain technology.
However, the content of the related researches of the existing security work is mainly focused on qualitative description, induction and analysis of the security system, wherein the research scope for the security examination work is more narrow, and the following disadvantages mainly exist: (1) the secure ledger is easy to tamper with; (2) the integrity of the secret ledger is poor; (3) the work of the illicit manipulation is difficult to perform.
Therefore, how to provide a secret ledger access method capable of solving the above-mentioned problems is a problem that a person skilled in the art needs to solve.
Disclosure of Invention
In view of the above, the present invention provides a secret ledger access method, system and storable medium based on blockchain, which effectively reduces the tamper-evident property of the secret ledger.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
the utility model provides a secret ledger access method based on block chain, is realized based on user side, electronic secret cabinet and block chain network, wherein electronic secret cabinet includes a plurality of secret rooms that are used for storing secret information, secret indoor portion is including a plurality of secret check, includes:
the user sends out request information for accessing the secret ledger through the browser;
performing identity verification on the user terminal, and selecting a data node in the blockchain network to access if the user terminal passes the identity verification;
and positioning the confidential ledger information at the data node to realize access.
Preferably, the specific process of generating the secret ledger access flow includes:
when the user side accesses the secret ledger, generating a first-level secret log from the identity information and the access starting time of the user side and storing the first-level secret log into the blockchain network;
generating a second-level security log when the security room information accessed by the user side and the operation information corresponding to the security room are stored in the blockchain network;
and generating a third-level security log according to the end time information of the user terminal after the related operation is completed, and simultaneously, carrying out digital signature by utilizing the private key and storing the digital signature to the blockchain network.
Preferably, the process of performing identity verification on the user terminal specifically includes:
the user side registers to generate a login account, a public key and a private key;
when logging in, the login account is used for carrying out login operation, and the public key is used for verification;
if the verification is passed, when the user side performs related operation on the secret ledger, the private key is utilized to generate a corresponding access record signature, the access record signature is attached to the secret ledger, and the operation is stored in the blockchain network.
Preferably, the method further comprises: the security ledger tamper-proof process specifically comprises the following steps:
detecting a root hash value of the secret ledger in real time;
and when the root hash value of the secret ledger is changed, indicating that the secret ledger is tampered.
Preferably, the specific process of selecting the data node for access includes:
when the user passes the identity verification, the current data node of the accessed blockchain network judges whether the request information needs to be requested to other nodes;
if yes, searching the node closest to the current data node and sending the request information, and if not, completing the request operation by the current data node.
The invention further provides a secret ledger access system based on the blockchain, which is realized based on a user side and comprises the following steps:
the application layer is used for realizing information registration and inquiry of the user side;
the execution layer is used for realizing the inquiry of the secret log;
the intelligent contract layer is used for realizing information identification of the user side;
a data layer comprising data and a blockchain network.
Preferably, the blockchain network includes:
a block header for the number of block bytes and the root hash value of the secret ledger information;
and the zone block is used for storing the number of the secret ledger information in the zone block, the data volume of the zone block and the ledger information recorded in the zone block.
Further, the present invention also provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements a method as described in any of the above.
Compared with the prior art, the invention discloses a secret ledger access method, a secret ledger access system and a storable medium based on block chains, which have the following beneficial effects:
(1) The block chain technology is combined with the confidentiality work, so that the working efficiency can be effectively improved;
(2) By improving the number of blocks, the number of data centers and the electronization degree of the secret ledger, the tamper-evident property of the secret ledger is effectively reduced, the non-repudiation property of the secret ledger record is enhanced, and the traceability of the secret ledger record is improved;
(3) On the basis that the security examination work, the security management work, the security setting work and the information disclosure work are all improved, the overall quality of the security work is also improved, and the security examination work is particularly embodied as the improvement of the leakage and violation conditions.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only embodiments of the present invention, and that other drawings can be obtained according to the provided drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a method for secure ledger access based on blockchain provided by the present invention;
FIG. 2 is a schematic block diagram of a secret ledger access system based on blockchain provided by the invention;
FIG. 3 is a graph of the 0.25 month stability test results provided by the example of the present invention;
FIG. 4 is a graph of the 0.5 month stability test results provided by the example of the present invention;
FIG. 5 is a graph of the results of a 1 month stability test provided in the examples of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, an embodiment of the present invention provides a secret ledger access method based on a blockchain, which is implemented based on a user side, an electronic secret cabinet and a blockchain network, wherein the electronic secret cabinet includes a plurality of secret rooms for storing secret information, and the inside of the secret rooms includes a plurality of secret cells, including:
the user sends out request information for accessing the secret ledger through the browser;
carrying out identity verification on the user terminal, and if the user terminal passes the identity verification, selecting a data node in the blockchain network for access;
and positioning the confidential account information at the data node to realize access.
Specifically, before the secret ledger is stored, the importance degree of the secret examination work in the whole secret work needs to be determined, and the secret ledger is mainly realized by using an evolution game theory, and the specific process comprises the following steps:
(1) The influencing parameters are determined, see in particular table 1:
TABLE 1 sign and meaning of parameters
Suppose (1): people, secret staff and examination institutions all make decisions from the perspective of improving self income and simultaneously minimizing cost loss.
Suppose (2): consumer behavior policy set S 1 = { supervision report D 1 Unsupervised reporting D 2 -a }; security staff behavior policy set S 2 = { compliance work a 1 Illegal work A 2 -a }; behavior policy set S of auditing organization 3 = { compliance audit C 1 Violation audit C 2 }。
Suppose (3): the auditing mechanism pays fixed auditing cost, the capability of the auditing mechanism has no problem, and the auditing result can be distorted only on the premise that the auditing mechanism can obtain larger benefits.
Suppose (4): under a long-term view, based on a limited rational assumption, the proportion of the attitude of active supervision and reporting in the masses is p, the proportion of normal security work in a security staff group is q, the proportion of compliance supervision selected by a checking mechanism is m, and p, q, m E [0,1].
Suppose (5): income R of people 1 、R 1 ' and δR 1 The following relationships are satisfied: r is R 1 >R 1 ’>δR 1 >0。
Suppose (6): the cost of the security staff for illegal security work is lower than that of the normal security work, namely c 1 And c 2 The following relationships are satisfied: c 1 >c 2 >0。
Suppose (7): after the introduction of the privacy inspection blockchain system, the privacy inspection work becomes more stringent and accurate. Embodied as reduced cost of security inspection work, increased cost of cheating, i.e. c s Reduction, E 3 Increasing.
(2) Evolution game model construction
The game revenue matrix is shown in table 2, and is obtained according to the revenue matrix:
1) The desired benefits when people choose to supervise and report:
the people choose the expected benefits when not supervising the reporting:
average expected benefits for the people:
2) The security staff chooses the expected benefits of compliance work:
the security staff selects the expected benefit of the offending work:
average expected benefit of the secret staff population:
3) The auditing institution selects the expected benefits in compliance auditing:
the auditing institution selects the expected benefits when the violation is audited:
average expected revenue for the screening institution:
4) Duplicating dynamic equations
The system of duplicate dynamic equations for the national secret work evolution game can be expressed as:
TABLE 2 three-party game income matrix for people, secret staff and censoring institutions
In the duplication dynamic system of the secret work three-way evolution game, the equation (1-10) =0 can obtain an equilibrium point (equilibrium point).
When the secret work three-way evolution game balance is analyzed, only 8 pure strategy balance points need to be researched. In analyzing the stability of the three-way evolution game, the first lyapunov method (indirect method) should be used to determine the stability of the equilibrium point. Therefore, the jacobian matrix and its eigenvalues corresponding to the eight pure policy equalization points should be first solved.
The 8 pure policy equilibrium points are: e (E) 1 (0,0,0),E 2 (0,0,1),E 3 (0,1,0),E 4 (1,0,0),E 5 (1,1,0),E 6 (1,0,1),E 7 (0,1,1),E 8 (1,1,1)。
The seven other pure strategy equalization points are sequentially brought into the jacobian matrix, and matrix characteristic values corresponding to the seven pure strategy equalization points can be obtained as shown in table 3:
table 3 corresponding eigenvalues and stabilization of the equalization points
Firstly, the worst condition is defined, parameters in characteristic values are adjusted to be unstable points, then the best condition is defined on the basis, and the best condition is promoted to be a progressive stable balance point of the evolution game.
From the foregoing description, the equalization point E can be determined 1 (0, 0) is the worst caseIn this case, no individual in each office fulfills itself the role that it should fulfill in the security work, which is referred to herein as a "security-unauthorised case". In order to prevent the occurrence of the security-free condition, the security-free condition should be made an unstable point, and the equalization point E should be made 1 Positive values exist in the eigenvalues λ of the jacobian matrix corresponding to (0, 0), even if at least one inequality in the condition sets 1-13 holds:
the actual meaning of these three conditions is:
the first condition indicates that the people obtain rewards g successfully due to reporting 2 Above the reporting cost j, the condition makes people more prone to making a supervision reporting decision after finding out the phenomenon of improper secret.
The second condition is that the cost paid by the secret liability person is greater than the total income when the secret liability person pays for renting while choosing random secret setting. Cost refers to the paying rental seeking R 2 The method comprises the steps of carrying out a first treatment on the surface of the The benefits include rewards g obtained by the responsible person through auditing 1 And the cost c saved by the optional secret setting of the secret setting responsible person 1 -c 2 And penalty E avoided by passing the audit 2 . When the condition is met, the secret-setting responsible person does not have enough incentive to select random secret setting, and pay for renting.
The third condition represents the penalty E of the audit organization due to distorting audit results 3 Rental seeking R greater than that collected 2 . I.e. when the system is introduced, push E 3 Such that the audit organization does not have enough incentive to collect the lease and thereby distort the audit results.
Further, at the equalization point E 1 On the premise that (0, 0) is an unstable point, the best situation can be promoted to be a progressive stable point, namely the ESS in the evolution game. From the foregoing description, it can be seen that the best case is the equalization point E 8 (1, 1) in this equilibrium, all people in each office are activeThe security work is driven to develop in order, and this situation is named as "security ideal situation" herein. In order to make the security ideal be normal, the corresponding equalization point should be ESS, i.e. equalization point E 8 The eigenvalues λ of the jacobian matrix corresponding to (1, 1) are all negative, even if the condition sets 1-14 are true:
if the condition sets 1-14 are satisfied, the equalization point E can be made 8 (1, 1) becomes ESS in long-term evolutionary gaming. The actual meaning of these two conditions is:
the first condition is that the cost paid by the secret-setting responsible person is greater than the total income when the secret-setting responsible person selects random secret setting but does not pay for lease. Cost includes penalty E due to random secret failing audit 1 And E is 2 And rewards g lost due to failed audits 1 The method comprises the steps of carrying out a first treatment on the surface of the Benefit refers to cost c saved by optional densification of the selection 1 -c 2 . When this condition is established, the secret liability person does not have enough incentive to select random secret without seeking lease.
The second condition refers to the punishment E of the auditing organization due to distortion auditing results 3 External rental seeking R greater than it collects 2 '. I.e. when the CRBS system is introduced, it will push E 3 Such that the audit organization does not have enough incentive to collect external rentals and distort audit results.
Through the analysis, at least one condition in the condition groups 4-13 is established, and all conditions in the condition groups 4-14 are established, so that the security non-guarantee condition becomes an unstable point in long-term evolution equalization, and the security ideal condition becomes a progressive stable point, thereby realizing continuous and good development of security work in a long term. Combining the condition sets 1-13 and 1-14 can result in condition sets 1-15;
r in the first two conditions in condition sets 1-15 2 And R is 2 ' is constant, so that the establishment of both conditions is directly dependent on E 3 I.e. depending on the effect of the security screening work. In practice, therefore, E should be increased at first in order to improve the security work 3 The former two conditions are satisfied, and the application of the CRBS system can directly push E 3 And (5) increasing the value. The parameters in the third condition are then optimized to be true. When the third condition is satisfied, the equalization point E can be set 8 (1, 1) becomes ESS in long-term evolutionary gaming. Finally, the fourth condition is an intensification condition, which is satisfied to ensure the equalization point E 8 (1, 1) becomes the only ESS and the establishment of this condition is also dependent to some extent on the quality of the privacy inspection effort.
In a specific embodiment, the specific process of generating the secure ledger access flow includes:
when a user accesses the secret ledger, generating a first-level secret log from the identity information and the access starting time of the user and storing the first-level secret log into a blockchain network;
generating a second-level security log when security room information accessed by a user side and operation information corresponding to the security room are stored in a blockchain network;
and generating a third-level secret log according to the end time information of the user terminal after the related operation is completed, and storing the third-level secret log in a blockchain network after the digital signature is carried out by utilizing a private key.
In a specific embodiment, the process of performing identity verification on the user terminal specifically includes:
the user side registers to generate a login account, a public key and a private key;
when logging in, the login account is used for carrying out login operation, and the public key is used for verification;
if the verification is passed, when the user side performs related operation on the secret ledger, the private key is utilized to generate a corresponding access record signature, the access record signature is attached to the secret ledger, and the operation is stored in the blockchain network.
In a specific embodiment, the method further comprises: the security ledger tamper-proof process specifically comprises the following steps:
detecting a root hash value of the secret ledger in real time;
when the root hash value of the secret ledger changes, the situation that the secret ledger is tampered is indicated.
In a specific embodiment, the specific process of selecting a data node for access includes:
when the user passes the identity verification, the current data node of the accessed blockchain network judges whether the request information needs to be requested to other nodes;
if yes, searching the node closest to the current data node and sending request information, and if not, completing the request operation by the current data node.
Further, referring to fig. 2, the present invention further provides a secret ledger access system based on blockchain, which is implemented based on a user side, and includes:
the application layer is used for realizing information registration and inquiry of the user side;
the execution layer is used for realizing the inquiry of the secret log;
the intelligent contract layer is used for realizing information identification of the user side;
a data layer comprising data and a blockchain network.
In one particular embodiment, a blockchain network includes:
a block header for the number of block bytes and the root hash value of the secret ledger information;
and the zone block is used for storing the number of the secret ledger information in the zone block, the data volume of the zone block and the ledger information recorded in the zone block.
Further, an embodiment of the present invention also provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor implements a method according to any of the above embodiments.
In order to verify the stability of the system, the embodiment of the invention uses Vensim 8.0.9 version software to carry out simulation analysis on the system based on the system mechanics principle, the main mode of stability test is to change the time step, if the simulation results obtained by different time steps are not big in and out, the model can be considered to be consistent with the objective reality system, otherwise, the model can be proved to not correctly reflect the objective reality system. The method of changing the time step is also adopted for stability test, and the step parameter setting is respectively as follows: the test results obtained for 0.25 month, 0.5 month and 1 month are shown in fig. 3, 4 and 5, and it can be seen that the traceability of the security work, the improvement rate of the security management work and the improvement rate of the security inspection work are basically the same in the simulated images at different time steps, so that it can be concluded that: the simulation model passes the stability test.
In the present specification, each embodiment is described in a progressive manner, and each embodiment is mainly described in a different point from other embodiments, and identical and similar parts between the embodiments are all enough to refer to each other. For the device disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and the relevant points refer to the description of the method section.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (5)

1. The utility model provides a secret ledger access method based on block chain, is realized based on user side, electronic secret cabinet and block chain network, wherein electronic secret cabinet includes a plurality of secret rooms that are used for storing secret information, secret indoor portion is including a plurality of secret check, its characterized in that includes:
the user sends out request information for accessing the secret ledger through the browser;
performing identity verification on the user terminal, and selecting a data node in the blockchain network to access if the user terminal passes the identity verification;
positioning confidential account information at the data node to realize access;
before the secret account is stored, determining the importance degree of the secret examination work in the whole secret work by utilizing an evolution game theory;
the specific process for generating the secret ledger access flow comprises the following steps:
when the user side accesses the secret ledger, generating a first-level secret log from the identity information and the access starting time of the user side and storing the first-level secret log into the blockchain network;
generating a second-level security log when the security room information accessed by the user side and the operation information corresponding to the security room are stored in the blockchain network;
and generating a third-level secret log according to the end time information of the user terminal after the related operation is completed, and simultaneously, carrying out digital signature by using a private key and storing the digital signature in the blockchain network.
2. The secret ledger access method based on blockchain as in claim 1, wherein the process of performing authentication on the client specifically comprises:
the user side registers to generate a login account, a public key and a private key;
when logging in, the login account is used for carrying out login operation, and the public key is used for verification;
if the verification is passed, when the user side performs related operation on the secret ledger, the private key is utilized to generate a corresponding access record signature, the access record signature is attached to the secret ledger, and the operation is stored in the blockchain network.
3. The secret ledger access method based on blockchain of claim 1, further comprising: the security ledger tamper-proof process specifically comprises the following steps:
detecting a root hash value of the secret ledger in real time;
and when the root hash value of the secret ledger is changed, indicating that the secret ledger is tampered.
4. The secret ledger access method based on blockchain of claim 1, wherein the specific process of selecting the data node for access comprises:
when the user passes the identity verification, the current data node of the accessed blockchain network judges whether the request information needs to be requested to other nodes;
if yes, searching the node closest to the current data node and sending the request information, and if not, completing the request operation by the current data node.
5. A computer readable storage medium, characterized in that it has stored thereon a computer program which, when executed by a processor, implements the method according to any of claims 1 to 4.
CN202210644234.4A 2022-06-09 2022-06-09 Secret ledger access method, system and storable medium based on blockchain Active CN115065680B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210644234.4A CN115065680B (en) 2022-06-09 2022-06-09 Secret ledger access method, system and storable medium based on blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210644234.4A CN115065680B (en) 2022-06-09 2022-06-09 Secret ledger access method, system and storable medium based on blockchain

Publications (2)

Publication Number Publication Date
CN115065680A CN115065680A (en) 2022-09-16
CN115065680B true CN115065680B (en) 2024-01-09

Family

ID=83200615

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210644234.4A Active CN115065680B (en) 2022-06-09 2022-06-09 Secret ledger access method, system and storable medium based on blockchain

Country Status (1)

Country Link
CN (1) CN115065680B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108288157A (en) * 2018-01-25 2018-07-17 青岛闪收付信息技术有限公司 A kind of supply chain management method based on financial block chain technology
CN110189144A (en) * 2019-05-07 2019-08-30 上海趣链信息科技有限公司 A kind of source tracing method and system based on block chain
CN110929229A (en) * 2019-11-26 2020-03-27 中国石油大学(华东) Block chain-based office document credibility verification method and system
CN111427961A (en) * 2020-04-10 2020-07-17 重庆新致金服信息技术有限公司 Block chain-based resume right determination method, block chain resume system and equipment thereof
CN114595205A (en) * 2021-11-29 2022-06-07 国网辽宁省电力有限公司大连供电公司 Block chain-based power system log partition storage and retrieval verification method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112035896B (en) * 2020-07-20 2024-03-29 傲为有限公司 Electronic contract evidence-storing system based on transaction mode

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108288157A (en) * 2018-01-25 2018-07-17 青岛闪收付信息技术有限公司 A kind of supply chain management method based on financial block chain technology
CN110189144A (en) * 2019-05-07 2019-08-30 上海趣链信息科技有限公司 A kind of source tracing method and system based on block chain
CN110929229A (en) * 2019-11-26 2020-03-27 中国石油大学(华东) Block chain-based office document credibility verification method and system
CN111427961A (en) * 2020-04-10 2020-07-17 重庆新致金服信息技术有限公司 Block chain-based resume right determination method, block chain resume system and equipment thereof
CN114595205A (en) * 2021-11-29 2022-06-07 国网辽宁省电力有限公司大连供电公司 Block chain-based power system log partition storage and retrieval verification method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"区块链技术在保密监督检查工作中的应用研究";张艺敏等;《网络空间安全》;第11卷(第12期);正文第1-7页 *

Also Published As

Publication number Publication date
CN115065680A (en) 2022-09-16

Similar Documents

Publication Publication Date Title
Wang et al. A blockchain based privacy-preserving incentive mechanism in crowdsensing applications
Zhang et al. A storage optimization scheme for blockchain transaction databases.
CN109104413B (en) Method for solving intersection of private data for secure multi-party computation and verification method
Epstein Capital flight and capital controls in developing countries
CN109450638A (en) Electronic component data management system and method based on block chain
CN109040012A (en) A kind of data security protecting and sharing method based on block chain and system and application
KR102237014B1 (en) System and method for blockchain-based authentication
CN109710823A (en) Archive management method, file administration network and electronic equipment based on block chain
CN109636569B (en) Credit investigation data management method and system based on block chain
CN110519246A (en) Based on the degree of belief calculation method for trusting block chain link point
CN106897930A (en) A kind of method and device of credit evaluation
He et al. A cross-chain trusted reputation scheme for a shared charging platform based on blockchain
CN115859345B (en) Data access management method and system based on block chain
CN112116352A (en) Distributed energy transaction method for protecting user account privacy
CN113779617A (en) State channel-based credible supervision and scheduling method and device for federal learning task
CN112084343A (en) Method, device and medium for quantifying social relationship graph
CN115065680B (en) Secret ledger access method, system and storable medium based on blockchain
CN114022285A (en) Cross-enterprise cloud computing resource metering method and system based on alliance block chain
Huang et al. Incentive assignment in hybrid consensus blockchain systems in pervasive edge environments
CN111260363A (en) Public benefit fund supervision method, device, equipment and medium based on block chain
CN109189742A (en) topic extracting method and system
CN114626934A (en) Block chain-based multi-level wind control system and control method
Yang et al. Evaluating fork after withholding (FAW) attack in Bitcoin
Vairam et al. ApproxBC: Blockchain design alternatives for approximation-tolerant resource-constrained applications
CN104717244B (en) A kind of various dimensions credit management method based on distributed computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant